Characteristics and differences between RS485 and RS232 RS232 and RS485 have always been the weak current common interface, but there are a lot of people do not understand the difference between them is not very thorough.
I. overview of RS485
RS-485 serial bus is widely used when the communication distance is tens of meters to thousands of meters. RS-485...

What is M2M? As is known to all, besides providing more broadband speed and quality, 5G is characterized by the application of the Internet of things (IoT) from the demand and design stage. In order to adapt to different applications, mobile communication technology with no wiring, high coverage and high reusability has become an important...

4g router features of E-lins Technology With the development of new communication technologies and the continuous improvement of network efficiency and function of wireless communication, 4G has been widely used. 4G industrial-grade wireless routers are playing an increasingly important role in the applications of various industries, and the price is getting...

With the development of new communication technologies and the continuous improvement of network efficiency and function of wireless communication, 4G has been widely used. 4G industrial-grade wireless routers are playing an increasingly important role in the applications of various industries, and the price is getting cheaper and cheaper. Currently, there are a lot of optional devices in the market, so how to choose one that can guarantee long-term use, stability and reliability, and affordable price is the problem that customers think about the most. The following is a specific selection reference for the 4G industrial wireless router of E-lins technology.

I. Industrial-grade design

1. Adopt high-performance industrial-grade 32-bit processor and adopt qualcomm chip, the world’s top wireless solution, with high processing speed, low power consumption, low heat output, strong compatibility and more stable, which can meet the requirement of 365 days a year, 7*24 hours long and stable operation without dropping the line.

The operating system uses OpenWRT, a highly modular, highly automated embedded Linux system, which makes the device more stable, has a large capacity of Flash and memory, and can support the requirements of customized development. High quality PCB circuit boards are manufactured with high quality materials and high standard. Stable industrial components are used for product components. All the machines are automated to realize patch production, ensuring the stability and reliability of the products. The power supply adopts wide voltage design to support dc5v-40v, with built-in anti-phase protection and over-voltage and over-current protection of the power supply, which can withstand the impact of instantaneous high voltage and current. Ethernet USES gigabit network port, built-in electromagnetic protection Ethernet interface built-in 1.5kv electromagnetic isolation protection, gigabit network port, faster transmission speed. The shell with strong anti-interference ability adopts thickened metal shell, shielding electromagnetic interference, and the equipment protection grade IP34, which is suitable for use in harsh industrial environment.

Support IP penetration function can achieve the IP address of the host IP obtained for the router, which is equivalent to the host directly plugging in the card to dial up the Internet to obtain the IP of the base station.

Windows Server support VPN Server features. Here let’s talk how to set up it.

Step1) Open “Server Manager“.

Step2) On the top menu, click on “Action” and “Add Roles“.

This will bring up the role installation wizard. On the first screen titled “Before your begin” read the requirements and click “Next” to continue.

Step3) Next, on the screen titled “Select Server Roles“, place check mark on “Network Policy and Access Services” and click “Next” to continue.

On the third screen titled “Network Policy and Access Services” read what it is stated and click “Next” to continue.

On the following screen titled “Select Role Services” place a check mark on “Routing and Remote Access Services” and make sure “Remote Access Service” and “Routing” are selected as well. Click “Next” to continue”.

Step4) Next, on the screen titled “Confirm Installation Selection“, you will get a summary of everything that will be installed. Make sure everything looks good and click on the “Install” button. Once the installation finishes, click “Close” to end the wizard.

Back on the main Server Manager window, right click on “Configure and Enable Routing and Remote Access“.

This will bring up the “Routing and Remote Access Wizard“. On the first window, click “Next“.

Step5) On the second window, select “Custom Configuration” and click “Next” to continue.

Step6) Next, place a check mark on “VPN access” and click “Next” to continue.

On the last screen of the wizard, click “Finish” and then click “Start Service” on the following window that will pop up.

Step7) Once the process is finished, and you are back on the main Server Manager window, routing and remote access should now be up and running.

Step8) Open Ports on the Firewall

For PPTP open:

Port 1723 TCP
Port 47 GRE

Step9) Give Domain Users Access to the VPN

If you are on a domain, go to your domain server, click on “Start“, “All Programs“, “Administrative Tools“, “Active Directory Users and Computers“.

Step10) On the left hand side column, look for your domain users. Double click on the user you want to give access to. This will bring up the properties for that user. Click on the “Dial-In” tab and under “Network Access Permission” select “Allow Access“. Click “Apply” and “Ok” to finish.

Repeat the same operation for all users on your network you want to give VPN access to. And that is it, as simple as that!

A virtual private network (VPN) extends a private network across a public network or internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

VPNs can provide functionality, security and/or network management benefits to the user. But they can also lead to new issues, and some VPN services, especially “free” ones, can actually violate their users’ privacy by logging their usage and making it available without their consent, or make money by selling the user’s bandwidth to other users.

Some VPNs allow employees to securely access a corporate intranet while located outside the office. Some can securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users can use some VPNs to secure their wireless transactions, to circumvent geo-restrictions and censorship, and/or to connect to proxy servers for the purpose of protecting personal identity and location. But some Internet sites block access via known VPNs to prevent the circumvention of their geo-restrictions.

A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.

Traditional

VPNs are characterized by a point-to-point topology, and they do not tend to support or connect broadcast domains, so services such as Microsoft NetBIOS may not be fully supported or work as they would on a local area network (LAN). Designers have developed VPN variants, such as Virtual Private LAN Service (VPLS), and layer-2 tunneling protocols, to overcome this